Thursday, June 25, 2015

TechTalk June 22, 2015

Andrew Thomas from joined me for an hour of talking about the technology that we are interested in and that we think is important.


Here are the show notes and links.

Like this but not sure why!
massively addicitive game - just like frogger!
Is Apple letting us down? YES!

SHould apple move into search?

Not everyone loves apple, just like she did at spotify taylor swift will not let her new album on apple music

Change at twitter!

Windows is free!  Or is it, that free upgrades gets some clarification

do we want auto play videos? tough luck there coming anyway!

time for tumblr to make a stand

jurassic cookie classic!

Love this

Very useful star wars information!

According to a new infographic released by retail site Ebates -- and shown to CNET's Crave blog before anyone else -- the Death Star would need to be filled with 1.6 x 10^28 AA Duracells to do its thing. That's 1.6 followed by 28 zeros, in case math hurts your brain (like it does mine). "Stacked end to end, these batteries would measure 84.5 billion light-years, almost enough to stretch across the observable universe," says the graphic.
I know, usually you're thinking of those little batteries singly, or in clusters of just two to four, powering your wireless mouse, TV remote or toy controller.
Of course, there are other fuel sources on Earth and the infographic does a good job of showing how they might all help power various gear in the "Star Wars" universe. For example, a light saber would need 650 car batteries to cut through steel blast doors, the cannons on an X-wing fighter would use 9.8 barrels of oil per discharge, and a shot from a blaster would require 14 Tesla Powerwalls -- the new in-home battery from inventor Elon Musk that will store electricity from solar panels or the main grid.

OK this is such a simple and cool driving aid, see through truck!

Amazon to pay authors based on pages read soon!

Beginning on July 1st, authors who self-publish through Amazon’s KDP Select Program will become part of a new publishing experiment. Currently, Amazon divvies up a pot of money to its native authors each month, based on the number of times their e-Books are “borrowed” through two separate Kindle services: Kindle Unlimited, a standalone, $9.99 / month subscription service, and the Kindle Lending Library, an Amazon Prime membership perk. In the new scheme, authors will be paid for each page that remains on the screen long enough to be parsed, the first time a customer reads the book.
What this system will essentially do is reward authors who write cliffhangers and page-turners; books that can keep the reader hooked. As The Atlantic explains, the payment scheme will also help neutralize the sentiment among authors of longer books that they’re being shortchanged:

OK this is too cool a USb digital microscope! 35$

8 second videos the sweet spot?
Instagram locks advertisers in to the 15-second social video ad, while Vine requires them to build six-second clips. As just about every platform and publisher pushes brands to run shorter videos that grab consumers' attention, Pandora's chief revenue officer John Trimble said he thinks eight-second promos could be mobile video's silver bullet.
Late last year, Pandora rolled out Sponsored Listening, an ad format that lets consumers listen to one hour of ad-free music in exchange for watching a short video promo. Bud Light, Fox and Sony PlayStation have all tested the format since then.
Currently, those pre-roll videos are at least 15 seconds and can run up to two-and-a-half minutes. But it's no surprise that getting people to pay attention for even 15 seconds is tough, causing Trimble to make the case for eight-second preroll. The idea is that an eight-second ad is a nice balance between the length of a six-second Vine and a 10-second video.

Poweliks! The world of computer security is crazy!

Trojan.Poweliks first grabbed people’s attention in 2014 when it evolved into a registry-based threat. As a registry-based threat, Poweliks does not exist as a file on the compromised computer and instead resides only in the Windows registry. While fileless threats that reside in memory-only have been seen before, Poweliks stands out from this crowd because of a persistence mechanism that allows it to remain on the compromised computer even after a restart.
This persistence mechanism is not the only trait that makes Poweliks unique. The Trojan uses other registry tricks, such as a special naming method, to make it difficult for users to find it and then uses CLSID hijacking to maintain its persistence on the compromised computer. Poweliks will also exploit a zero-day privilege escalation vulnerability to take control of the compromised computer. Furthermore, the threat adds the compromised computer to a click-fraud botnet and forces it to download advertisements without the victim’s knowledge.

Did you know Deep linking is an issue?

This is VERY cool! This was where the TV was introduced as a commercial tool! 1939 worlds fair!

What Is A Deep Link?

In the most simple interpretation, a deep link is any link that directs a user past the home page of a website or app to content inside of it. e.g. linking directly to a product instead of the home page. In the context of 2015, we’re particularly interested in mobile deep links; links that can be used to open an app to a specific piece of content or action. For example the URL fb:// may open the Facebook app, but fb://profile/33138223345 opens Wikipedia’s profile in the Facebook app.

Deep linking has grown up with the Internet

The concept of deep linking has been around for a long time; first appearing commonly in media around 2006 to describe the growing practice of providing Google (and other search engines) with visibility into pages beyond the home page.
At the time, the term was also commonly misused to refer to hot linking, the practice oflinking directly to files for download that were hosted by a third, non-participating party. That earned deep linking a public association with the exploding controversy around the online consumption of copyrighted material.
A number of courts in the U.S. issued judgements (and injunctions) on the idea that linkingdirectly to content within a website could be a breach of that party’s copyright, especially when such a deep-linking party was monetizing the content with ads served alongside the content (such as a search listing preview). In 2006, threats against deep linking posed as real a threat to the open and functional Internet as those of net neutrality have in 2014.
Just downloaded this and it is AWESOME!

Uber style delivery by Amazon! Cool!

It all comes down to mobile apps!

No comments: